Physical controls
Physical controls: Security measures implemented in the physical environment to protect sensitive information from unauthorized access. These measures include locks, barriers, alarms, and surveillance cameras, aimed at deterring and detecting security threats. For example, locked doors and security cameras can prevent unauthorized entry to a building, while a password-protected login screen can secure information on […]
Pan-tilt-zoom (PTZ)
Pan-tilt-zoom (PTZ): A type of camera distinguished by its capability to remotely directional and zoom control. In a security context, PTZ cameras are often used for surveillance, allowing operators to monitor large areas with a single camera. The pan feature allows the camera to move left or right, tilt moves up and down, and zoom […]
Non-Conductive, Non-Toxic Liquid Suppressants (NOVEC)
Non-Conductive, Non-Toxic Liquid Suppressants (NOVEC): Non-Conductive, Non-Toxic Liquid Suppressants, marketed under the brand name NOVEC, are fire suppression solutions designed for use in environments with sensitive electronic equipment, such as data centers. These suppressants extinguish fires without causing damage to hardware or leaving harmful residues, ensuring the safety of both the equipment and the facility.
Lockout
Lockout: A security measure that prevents a user from accessing a system or network after a certain number of failed login attempts. It is used to prevent unauthorized access and to protect against brute-force attacks. Examples include lockout policies on password-protected accounts and network access points.
Logical Access Control
Logical Access Control: The mechanisms used to manage access rights to resources on a computer system or network, often based on user identity or role. These mechanisms determine who or what can view or use resources in a computing environment. Examples of logical access control methods include user authentication processes, access control lists (ACLs), and […]
Logical Access Token
Logical Access Token: A logical access token is an electronic key, typically in the form of a digital credential or token, used to authenticate a user and authorize that user’s access to systems, applications, or data. This can include software-based tokens, hardware tokens, or cryptographic tokens used in multifactor authentication systems.